๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Access control in wireless sensor networks

โœ Scribed by Yun Zhou; Yanchao Zhang; Yuguang Fang


Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
294 KB
Volume
5
Category
Article
ISSN
1570-8705

No coin nor oath required. For personal study only.

โœฆ Synopsis


Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious ''new'' nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate between old nodes and new nodes. In addition, each new node can establish shared keys with its neighbors during the node authentication procedure. Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA.


๐Ÿ“œ SIMILAR VOLUMES


Channel allocation and medium access con
โœ Kaushik R. Chowdhury; Nagesh Nandiraju; Pritam Chanda; Dharma P. Agrawal; Qing-A ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 389 KB

Recent developments in sensor technology, as seen in Berkeley's Mica2 Mote, Rockwell's WINS nodes and the IEEE 802.15.4 Zigbee, have enabled support for single-transceiver, multi-channel communication. The task of channel assignment with minimum interference, also named as the 2-hop coloring problem

Trust management in wireless sensor netw
โœ Zahariadis, Theodore ;Leligou, Helen C. ;Trakadas, Panagiotis ;Voliotis, Stamati ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 133 KB ๐Ÿ‘ 2 views

## Abstract The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhanc

Node density control for maximizing wire
โœ Moez Esseghir; Nizar Bouabdallah ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 374 KB

## Abstract One of the major concerns in wireless sensor networks is improving the network lifetime. In this paper, we investigate the node density impact on network lifetime. We show that the average amount of energy required to report an event to the sink decreases when wireless sensor node densi